logo

Importance of Information Governance and Cyber Security Threats

   

Added on  2023-01-18

10 Pages2965 Words32 Views
INFORMATION
GOVERNANCE AND
CYBER SECURITY
(PART A)
Importance of Information Governance and Cyber Security Threats_1
Table of Contents
INTRODUCTION...........................................................................................................................1
TASK 1............................................................................................................................................1
Critical evaluation of latest cyber security threats......................................................................1
Roles of Information Security auditors.......................................................................................2
TASK 2............................................................................................................................................3
Scope and content of
Information Security Management Systems (ISMS).................................................................3
Critical evaluation of Information governance framework.........................................................4
TASK 3............................................................................................................................................5
Importance of information governance.......................................................................................5
Risk
assessment methodologies.........................................................................................................6
Identify information
assets..........................................................................................................................................6
CONCLUSION................................................................................................................................7
REFERENCES................................................................................................................................8
Importance of Information Governance and Cyber Security Threats_2
INTRODUCTION
Information governance is policies, controls, processes, strategies and technology of
organisation are employed so that information can be amend to achieve business objectives.
Cyber security is technology, practices and processes formulated so that data, networks, devices
and programs are protected from unauthorised access (Murphy, 2015). Wallington Trust Hospital
(WTH) is concerns with providing health related services in London. In this report understanding
about new cyber security threats to data and need for information governance will be discussed.
Role of information security auditors in terms of social, legal and ethical requirements so that
information security management system (ISMS) is effective for organisation will be explained.
Scope and content of ISMS in context of organisation based on principles will be evaluated. At
last, evaluation of importance of information governance in relation with organisational context.
TASK 1
Critical evaluation of latest cyber security threats
Cyber security can be explained as processes, devise, practices and technology that helps
organisation in protecting its data, devices, programs and networks from unlawful or unapproved
access. Technologies and precautions are developed overtime so that risk can be minimised so
that loss of data can be reduced. Wallington Trust Hospital (WTH) is a healthcare organisation
which assist in secondary services related to health in London. There is need that management
should be aware about the significance of security to privacy and confidential data of patients.
There are number of threats to data which outline importance of information governance needed
by hospital, some of them are as follows:
Phishing: This threat is related to digital messages that leads to install malware or
passing on personal data to hackers. These are transmitted through e-mails, text messages that
leads to links and by clicking on it (Martin and et. al., 2017). By this hackers will be able to use
logins, credit credentials, and personal financial information, gain access to personal data. For
this tools like spam detector, blocking system for unauthorised links, etc. can be installed by
Wallington Trust Hospital so that threat can be reduced.
Electronic Media Records: Healthcare sector is going through evolution of moving
patients records and information online so that they can be maintained effectively. By this when
healthcare is adapting the digital technology, there are number of threats and safety concern for
1
Importance of Information Governance and Cyber Security Threats_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Governance And Cyber Security
|11
|3243
|86

Cyber Security Threats and Information Governance
|16
|4128
|21

Information Governance and Cyber Security (Part 2)
|12
|3275
|90

Information Governance and Cyber Security
|17
|6166
|47

Cyber Risk Management in Healthcare
|15
|1024
|10

Cyber security Planning and Compliance (pdf)
|11
|3109
|30